Professional services for data security
Palo Alto Cybersecurity, Datensicherheit, Palo Alto Networks
Data security is a service that enables the secure use of
cloud services securely by preventing data exposure and threat risks.
risks.
To speed up your implementation, accelerate onboarding
time to value from Software as a Service (SaaS) and data
(SaaS) and data prevention, Palo Alto Networks offers Professional
Services for Data Security that are aligned with best practices to increase
increase adoption. Our experts will guide you through the development and
deployment of your data security products to control approved SaaS applications
and associated data by reviewing and controlling how data is
data is shared, while preventing the introduction of malware.
prevent.
Benefits
- Granular visibility and precise control of approved SaaS applications with security policies for data and users.
- Customised implementation and configuration in in line with best practices.
- Consistent security controls for all resources and users. users.
- A detailed report on key milestones and next steps.
- Operational knowledge to keep your configuration up to date and and align it for growth.
Planning
- Conduct discovery workshops to understand the current environment
- Gather requirements from the client
- Create technical requirements document (TRD)
Configuration
- Configure the solution as documented in the TRD
- Complete the initial configuration
- Integrate SaaS applications
- Create security policy rules
- Initiate SaaS application
Validate
- Review scanned assets and incidents
- Support the client during validation testing
- Fine-tune the configuration to resolve the cases identified during the cases identified during the validation tests
- Performing the final validation
Handover and review
- Conducting a knowledge transfer session
- Passing on mission-specific information in an As-built document
The services are provided in four steps:
1. planning: Together with you we create a document of technical requirements (TRD) to define the production environment for SaaS security policies and operational procedures for up to four SaaS applications.
2. configuration: Next, in Notify, we create custom policies based on your requirements (up to 10). These policies will be based on predefined data patterns. If custom data patterns are required, please purchase the Custom Data Pattern Custom Data Patterns add-on service. We configure and test the connections of your SaaS applications (up to four) with the correct administrative account and initiate an asset scan. 3.
3. validation: once the configuration is complete, we review the generated incidents and asset classification with you and classification of the assets and ensure that you have received the expected result. expected result. We then help you adjust the policies - up to five misclassifications, false positives and true negatives. In Notification mode, you can start applying interceptions based on events from the Asset Scan to start applying remedial actions to rules.
4. handover and review: After the implementation is completed implementation, we conduct a knowledge transfer with your team, which includes administrative and operational best practices.
Related products